The New York Times, April 14, 1998, pp. D1, D5. Researchers Crack Code In Cell Phones Weakened Encryption Raises Security Concern By John Markoff San Francisco, April 13 -- In successfully cracking a widely used encryption method designed to prevent the cloning of digital cellular phones, a group of University of California computer researchers believe they have stumbled across evidence that the system was deliberately weakened to permit Government surveillance. The method that was cracked is known as G.S.M., for the Groupe Speciale Mobile standard. The world's most widely used encryption system for cellular phones, G.S.M. is employed in about 80 million of the devices worldwide and by as many as two million phones in the United States. Most of the 58 million American analog and digital cell phones are based on a variety of other methods, but 20 American cellular phone companies, including Pacific Bell, a unit of SBC Communications Inc., and the Omnipoint Corporation, use the G.S.M. standard. Two researchers at the University of California at Berkeley announced today that they had successfully broken the G.S.M. method by using a computer to determine a secret identity number stored in the Subscriber Identity Module, or S.I.M., a credit card-like device inside the phone. If criminals were to crack the method, they could "clone" phones protected by G.S.M. encryption -- that is, detect a phone's number and use it in another phone to fraudulently bill calls. However, both the researchers and cellular telephone company officials said today that the cloning threat was extremely remote compared with the vulnerability of analog cellular phones. For one thing, they said, cracking G.S.M. had required almost 10 hours of electronic probing and high-powered computing. What was even more intriguing than the security threat, however, was that cracking the code yielded a tantalizing hint that a digital key used by G.S.M. may have been intentionally weakened during the design process to permit Government agencies to eavesdrop on cellular telephone conversations. Although the key, known as A5, is a 64-bit encryption system -- generally an extremely difficult code to crack -- the researchers determined that the last 10 digits were actually zeros. That means that with the powerful computers available to national intelligence agencies, it would be possible to decode a voice conversation relatively quickly, said Marc Briceno, director of the Smartcard Developers Association, a small programmers organization. "It appears the key was intentionally weakened," he said. "I can't think of any other reason for what they did." For years, the computer industry has been rife with rumors about encryption designers having been persuaded or forced by Government spy agencies to mathematically weaken communications security systems or to install secret backdoors. Some of the rumors even have the National Security Agency or the Central Intelligence Agency posing as cryptographers, designing the encryption programs themselves and then releasing them -- all to insure that they could decode data or phone conversations. Such rumors are fed, in part, by the hazy origins of the G.S.M. system. Industry cryptographic experts said that the underlying mathematical formulas, or algorithms, in G.S.M.'s encryption design were thought to have originated in either Germany or France as part of the creation of the standard in 1986 and 1987. But other than today's hint of an intentionally weakened system, little evidence has ever emerged to support speculation, and the researchers' suspicions were not universally endorsed. "It's possible there are other reasons for doing this," Stewart Baker, a Washington lawyer who was formerly a lawyer for the National Security Agency, said. The N.S.A. is one of the agencies most often suspected of such schemes because a major part of its mission is to intercept telephone calls. "Speculation is easy, and it never dies," Mr. Baker said. Even so, most industry experts could think of no good reason why an encryption algorithm key would be intentionally shortened, other than to facilitate surveillance. "This was deliberately weakened," said Phil Karn, an engineer at Qualcomm Inc., a cellular telephone manufacturer that has developed an alternative standard to G.S.M. "Who do you think would be interested in doing something like this?" The weakened key was discovered by two researchers, Ian Goldberg and David Wagner, both members of the University of California at Berkeley's Internet Security Applications, Authentication and Cryptography Group, with the aid of Mr. Briceno. They stressed that they had easily detected the security flaw that could make digital cellular phones vulnerable to cloning. Cloning has been a costly fraud problem for.many years. But digital phones are widely believed to be immune from cloning. In San Francisco, Pacific Bell's billboard advertisements depict a sheep and a cell phone and boast that of the two only the cell phone cannot be cloned. Cellular telephone industry executives acknowledged the flaw in G.S.M. but said it actually reinforced their claims about the security of digital telephones. "My hat goes off to these guys they did some great work," said George Schmitt, president of Omnipoint. "I'll give them credit, but we're not at any risk of fraud." The researchers and the Smartcard Developers Association said that the successful attack was new evidence of the shortcomings of a widespread industry practice of keeping security techniques hidden from public review. Real security, they argue, requires publication of the algorithms so that independent experts can verify the strength of the systems. "This shows yet again a failure of a closed design process," Mr. Briceno said. "These companies pride themselves on their security, but now the chickens are coming home to roost." [End]
researchers believe they have stumbled across evidence that the system was deliberately weakened to permit Government surveillance.
I seem to recall that it was officially announced when the current GSM standard was released that it had been weakened at the request of European governments. Is this an example of anti-government advertising and promotion? Counting on the fact that no one will recall that we already knew this. DCF
There were rumors that governments had meddled with the A5/1 voice privacy algorithm design, causing a weakening of A5/1. I am unaware of any proof for these claims. A5/2 was of course designed to be weaker, a fact that has been acknowledged by the GSM consortium. We found undeniable proof that the keygen algorithm used by A5/1, called A8, has been deliberately weakened by the designers. We found the smoking gun. And it is smoking red hot. Any weakening in A5 itself would come in addition to the weakening of A8. --Lucky On Tue, 14 Apr 1998, Duncan Frissell wrote:
researchers believe they have stumbled across evidence that the system was deliberately weakened to permit Government surveillance.
I seem to recall that it was officially announced when the current GSM standard was released that it had been weakened at the request of European governments.
Is this an example of anti-government advertising and promotion? Counting on the fact that no one will recall that we already knew this.
DCF
-- Lucky Green <shamrock@cypherpunks.to> PGP v5 encrypted email preferred. "Tonga? Where the hell is Tonga? They have Cypherpunks there?"
participants (3)
-
Duncan Frissell
-
John Young
-
Lucky Green